Sciweavers

1486 search results - page 75 / 298
» Firewall Rules Analysis
Sort
View
SCIA
2005
Springer
110views Image Analysis» more  SCIA 2005»
15 years 5 months ago
Training Cellular Automata for Image Processing
Experiments were carried out to investigate the possibility of training cellular automata to to perform processing. Currently, only binary images are considered, but the space of r...
Paul L. Rosin
CLEAR
2007
Springer
145views Biometrics» more  CLEAR 2007»
15 years 6 months ago
Multi-person Tracking Strategies Based on Voxel Analysis
Abstract. This paper presents two approaches to the problem of simultaneous tracking of several people in low resolution sequences from multiple calibrated cameras. Spatial redunda...
Cristian Canton-Ferrer, Jordi Salvador, Josep R. C...
ACSAC
2004
IEEE
15 years 3 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
KDD
2009
ACM
132views Data Mining» more  KDD 2009»
16 years 13 days ago
Learning patterns in the dynamics of biological networks
Our dynamic graph-based relational mining approach has been developed to learn structural patterns in biological networks as they change over time. The analysis of dynamic network...
Chang Hun You, Lawrence B. Holder, Diane J. Cook
IFM
2010
Springer
205views Formal Methods» more  IFM 2010»
14 years 9 months ago
Adding Change Impact Analysis to the Formal Verification of C Programs
Handling changes to programs and specifications efficiently is a particular challenge in formal software verification. Change impact analysis is an approach to this challenge where...
Serge Autexier, Christoph Lüth